-
2
-
-
84954553031
-
Case studies show value of ISO/IEC 27001 conformity
-
Alkaff, A.S. (2009), “Case studies show value of ISO/IEC 27001 conformity”, ISO Management Systems, January/February, pp. 33-38.
-
(2009)
ISO Management Systems
, Issue.January/February
, pp. 33-38
-
-
Alkaff, A.S.1
-
3
-
-
0345354705
-
-
available at
-
Arcade, J., Godet, M., Meunier, F. and Roubelat, F. (2003), Structural Analysis with MICMAC Method & Actors' Strategy with MACTOR Method, available at: www.agriperi.ir/AKHBAR/cd1/FORESIGHT%20METHODOLOGY%20&%20FORECASTING/FORESIGHT%20METHODOLOGY/related%20articles/books/Future%20Research%20Methodology/4-stranal.pdf.
-
(2003)
Structural Analysis with MICMAC Method & Actors' Strategy with MACTOR Method
-
-
Arcade, J.1
Godet, M.2
Meunier, F.3
Roubelat, F.4
-
4
-
-
84872944057
-
-
available at
-
Australia (2009), “Cyber security strategy”, available at: www.ag.gov.au/www/agd/rwpattach.nsf/VAP/%284CA02151F94FFB778ADAEC2E6EA8653D%29∼AG+Cyber+Security+Strategy+-+ for+website.pdf/$file/AG+Cyber+Security+Strategy+-+for+website.pdf.
-
(2009)
Cyber security strategy
-
-
-
5
-
-
0005697229
-
Best practices in network security
-
Avolio, F.M. (2000), “Best practices in network security”, Network Computing, Vol. 60 No. 20.
-
(2000)
Network Computing
, vol.60
, Issue.20
-
-
Avolio, F.M.1
-
6
-
-
84954551976
-
Online retail banking: security concerns, breaches and controls
-
p.WileyHobokenNJ
-
Belasco, K. and Wan, S.-P. (2006), “Online retail banking: security concerns, breaches and controls”, Handbook of Information Security, Vol. 3, Wiley, Hoboken, NJ, p. 43.
-
(2006)
Handbook of Information Security
, vol.3
, pp. 43
-
-
Belasco, K.1
Wan, S.P.2
-
7
-
-
84954511016
-
-
Masters thesisavailable at
-
Berends, A.J. (2007), “Dealing with information loss”, Masters thesis, available at: www.tbm.tudelft.nl/fileadmin/Faculteit/TBM/Over_de_Faculteit/Afdelingen/Afdeling_Infrastructure_Systems_and_Services/Sectie_Informatie_en_Communicatie_Technologie/medewerkers/jan_van_den_berg/news/doc/arjen-berends.pdf.
-
(2007)
Dealing with information loss
-
-
Berends, A.J.1
-
9
-
-
84954486121
-
-
available at
-
CERT (2009), CERT Research Annual Report 2009, available at: www.cert.org/research/2009research-report.pdf.
-
(2009)
CERT Research Annual Report 2009
-
-
-
10
-
-
84954551631
-
-
available at
-
CSO (2010), Cyber Security Watch Survey Results, available at: www.csoonline.com/documents/pdfs/2010CyberSecurityResults.pdf.
-
(2010)
Cyber Security Watch Survey Results
-
-
-
15
-
-
79953896107
-
-
available at
-
Estonia (2008), “Cyber security strategy”, available at: www.mod.gov.ee/files/kmin/img/files/Kuberjulgeoleku_strateegia_2008-2013_ENG.pdf.
-
(2008)
Cyber security strategy
-
-
Estonia, E.1
-
16
-
-
84886122334
-
-
-Edward ElgarCheltenham
-
Gallaher, M.P., Link, A.N. and Rowe, B.R. (2008), Cyber Security: Economic Strategies and Policy Alternatives, Edward Elgar, Cheltenham, pp. 41-55.
-
(2008)
Cyber Security: Economic Strategies and Policy Alternatives
, pp. 41-55
-
-
Gallaher, M.P.1
Link, A.N.2
Rowe, B.R.3
-
19
-
-
0003552874
-
-
WileyNew YorkNY
-
Harary, F., Norman, R.Z. and Cartwright, D. (1965), Structural Models: An Introduction to the Directed Graphs, Wiley, New York, NY.
-
(1965)
Structural Models: An Introduction to the Directed Graphs
-
-
Harary, F.1
Norman, R.Z.2
Cartwright, D.3
-
21
-
-
67349144062
-
Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness
-
Herath, T. and Rao, H.R. (2009), “Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness”, Decision Support Systems, Vol. 47 No. 2, pp. 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
23
-
-
33745838617
-
An empirical study of information security policy on information security elevation in Taiwan
-
Hong, K.-S., Chi, Y.-P., Chao, L.R. and Tang, J.-H. (2006), “An empirical study of information security policy on information security elevation in Taiwan”, Information Management & Computer Security, Vol. 14 No. 2, pp. 104-115.
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.2
, pp. 104-115
-
-
Hong, K.S.1
Chi, Y.P.2
Chao, L.R.3
Tang, J.H.4
-
32
-
-
34250015784
-
Embedding information security into the organization
-
Johnson, M.E. and Goetz, E. (2007), “Embedding information security into the organization”, IEEE Security and Privacy, May/June, pp. 16-24.
-
(2007)
IEEE Security and Privacy
, Issue.May/June
, pp. 16-24
-
-
Johnson, M.E.1
Goetz, E.2
-
33
-
-
38949124423
-
Senior executives commitment to information security-from motivation to responsibility
-
Kajava, J., Anttila, J., Varonen, R., Savola, R. and Roning, J. (2006), “Senior executives commitment to information security-from motivation to responsibility”, Proceedings of International Conference, CIS 2006, Guangzhou, China, November 3-6.
-
(2006)
Proceedings of International Conference, CIS 2006, Guangzhou, China, November 3-6
-
-
Kajava, J.1
Anttila, J.2
Varonen, R.3
Savola, R.4
Roning, J.5
-
34
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
Kankanhalli, A., Teo, H.-H., Tan, B.C.Y. and Wei, K.-K. (2003), “An integrative study of information systems security effectiveness”, International Journal of Information Management, pp. 139-154.
-
(2003)
International Journal of Information Management
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.H.2
Tan, B.C.Y.3
Wei, K.K.4
-
35
-
-
44049084950
-
The top information security issues facing organizations: what can government do to help?
-
Knapp, K.J., Marshall, T.E., Rainer, R.K. and Morrow, D.W. (2006), “The top information security issues facing organizations: what can government do to help?”, Information Systems Security, Vol. 15 No. 4, pp. 51-58.
-
(2006)
Information Systems Security
, vol.15
, Issue.4
, pp. 51-58
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Morrow, D.W.4
-
36
-
-
84954553031
-
Case studies show value of ISO/IEC 27001 conformity
-
Kumar, A. (2009), “Case studies show value of ISO/IEC 27001 conformity”, ISO Management Systems, January/February, pp. 33-38.
-
(2009)
ISO Management Systems
, Issue.January/February
, pp. 33-38
-
-
Kumar, A.1
-
37
-
-
84864552045
-
Exploring the relationship between organizational culture and information security culture
-
Lim, J.S., Chang, S., Maynard, S. and Ahmad, A. (2009), “Exploring the relationship between organizational culture and information security culture”, Proceedings of the 7th Australian Information Security Management Conference.
-
(2009)
Proceedings of the 7th Australian Information Security Management Conference
-
-
Lim, J.S.1
Chang, S.2
Maynard, S.3
Ahmad, A.4
-
38
-
-
84954547154
-
-
available at
-
McAfee (2011), Risk and Compliance Outlook, available at: www.mcafee.com/us/resources/reports/rp-risk-compliance-outlook-2011.pdf.
-
(2011)
Risk and Compliance Outlook
-
-
McAfee, M.1
-
39
-
-
33749653120
-
ISO 17799: best practices in information security management?
-
Ma, Q. and Pearson, J.M. (2005), “ISO 17799: best practices in information security management?”, Communications of the AIS, Vol. 15, pp. 577-591.
-
(2005)
Communications of the AIS
, vol.15
, pp. 577-591
-
-
Ma, Q.1
Pearson, J.M.2
-
40
-
-
84954558487
-
-
available at:Department of Information TechnologyMinistry of Communications Information Technology Government of India
-
MIT (2011), Discussion Draft on National Cyber Security Policy, Department of Information Technology, Ministry of Communications and Information Technology Government of India, available at: www.mit.gov.in/sites/upload_files/dit/files/ncsp_060411.pdf.
-
(2011)
Discussion Draft on National Cyber Security Policy
-
-
-
42
-
-
84954554169
-
-
available at
-
NICE (2010), National Initiative for Cyber Security Education, available at: www.whitehouse.gov/sites/default/files/rss_viewer/cybersecurity_niceeducation.pdf.
-
(2010)
National Initiative for Cyber Security Education
-
-
-
44
-
-
1842829828
-
-
NIST Special Publication 800-30available at
-
NIST (2002), Risk Management Guide for Information Technology Systems, NIST Special Publication 800-30, available at: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
-
46
-
-
34748842440
-
-
NIST Special Publication 800-100available at
-
NIST (2006b), Information Security Handbook: A Guide for Managers, NIST Special Publication 800-100, available at: http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf.
-
(2006)
Information Security Handbook: A Guide for Managers
-
-
-
47
-
-
70350663440
-
-
NIST Special Publication 800-55Revision 1available at
-
NIST (2008), Performance Measurement Guide to Information Security, NIST Special Publication 800-55, Revision 1, available at: http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf.
-
(2008)
Performance Measurement Guide to Information Security
-
-
-
49
-
-
84873139978
-
-
NIST Special Publication 800-39available at
-
NIST (2011), Managing Information Security Risk, NIST Special Publication 800-39, available at: http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf.
-
(2011)
Managing Information Security Risk
-
-
-
52
-
-
51449091631
-
Information security cultures of four professions: a comparative study
-
Ramachandran, S., Srinivasan, V.R. and Tim, G. (2008), “Information security cultures of four professions: a comparative study”, Proceedings of the 41st Hawaii International Conference on System Sciences – 2008, Hawaii.
-
(2008)
Proceedings of the 41st Hawaii International Conference on System Sciences – 2008, Hawaii
-
-
Ramachandran, S.1
Srinivasan, V.R.2
Tim, G.3
-
57
-
-
0029482609
-
The objectives of waste management in India: a future inquiry
-
Sharma, H.D., Gupta, A.D. and Sushil (1995), “The objectives of waste management in India: a future inquiry”, Tech. Forecast. & Social Change, Vol. 48, pp. 285-309.
-
(1995)
Tech. Forecast. & Social Change
, vol.48
, pp. 285-309
-
-
Sharma, H.D.1
Gupta, A.D.2
Sushil, S.3
-
58
-
-
78649259651
-
Knowledge management barriers: an interpretive structural modeling approach
-
Singh, M.D. and Kant, R. (2008), “Knowledge management barriers: an interpretive structural modeling approach”, International Journal of Management Science and Engineering Management, Vol. 3 No. 2, pp. 141-150.
-
(2008)
International Journal of Management Science and Engineering Management
, vol.3
, Issue.2
, pp. 141-150
-
-
Singh, M.D.1
Kant, R.2
-
59
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, T. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, T.1
-
61
-
-
15744368808
-
Information security obedience: a definition
-
Thomson, K.-L. and von Solms, R. (2005), “Information security obedience: a definition”, Computers & Security, Vol. 24, pp. 69-75.
-
(2005)
Computers & Security
, vol.24
, pp. 69-75
-
-
Thomson, K.L.1
von Solms, R.2
-
65
-
-
84891084966
-
Parameter extraction for measurement of the effective information security management – statistical analysis
-
Vaish, A. and Varma, S. (2010), “Parameter extraction for measurement of the effective information security management – statistical analysis”, International Journal of Computer and Electrical Engineering, Vol. 2 No. 4, pp. 1793-8163.
-
(2010)
International Journal of Computer and Electrical Engineering
, vol.2
, Issue.4
, pp. 1793-8163
-
-
Vaish, A.1
Varma, S.2
-
66
-
-
33747053670
-
Information security-the forth wave
-
Von Solms, B. (2006), “Information security-the forth wave”, Computers & Security, Vol. 25, pp. 165-168.
-
(2006)
Computers & Security
, vol.25
, pp. 165-168
-
-
Von Solms, B.1
-
67
-
-
3042812983
-
The 10 deadly sins of information security management
-
Von Solms, B. and Von Solms, R. (2004), “The 10 deadly sins of information security management”, Computer & Security, Vol. 23 No. 3, pp. 191-198.
-
(2004)
Computer & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Von Solms, B.1
Von Solms, R.2
-
69
-
-
0015956034
-
Developing interconnected matrices in structural modeling
-
Warfield, J.W. (1974), “Developing interconnected matrices in structural modeling”, IEEE Transactions on Systems Men and Cybernetics, Vol. 4 No. 1, pp. 51-81.
-
(1974)
IEEE Transactions on Systems Men and Cybernetics
, vol.4
, Issue.1
, pp. 51-81
-
-
Warfield, J.W.1
|